Open Access. Powered by Scholars. Published by Universities.®
- Institution
Articles 1 - 5 of 5
Full-Text Articles in Law
Anarchy, Status Updates, And Utopia, James Grimmelmann
Anarchy, Status Updates, And Utopia, James Grimmelmann
Pace Law Review
Social software has a power problem. Actually, it has two. The first is technical. Unlike the rule of law, the rule of software is simple and brutal: whoever controls the software makes the rules. And if power corrupts, then automatic power corrupts automatically. Facebook can drop you down the memory hole; PayPal can garnish your pay. These sovereigns of software have absolute and dictatorial control over their domains.
Is it possible to create online spaces without technical power? It is not, because of social software’s second power problem. Behind technical power, there is also social power. Whenever people come together …
Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson
Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson
Loyola of Los Angeles Law Review
Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber attacks have increased in frequency, with many states declaring cyber operations a priority in what has been called the newest domain of warfare. But what rules govern? The Tallinn Manual on the International Law Applicable to Cyber Warfare suggests existent laws of war are sufficient to govern cyber activities; however, the Tallinn Manual ignores fundamental problems and unique differences between cyber attacks and kinetic attacks. This Article argues that several crucial impediments frustrate placing cyber attacks within the current umbra of warfare, chiefly the problems …
Buying Teams, Andres Sawicki
Buying Teams, Andres Sawicki
Seattle University Law Review
The Sixth Annual Berle Symposium reflects on Margaret Blair and Lynn Stout’s classic article: A Team Production Theory of Corporate Law. Blair and Stout recast the modern law of public corporations through the lens of the team production theory of the firm. Here, I apply Blair and Stout’s insights—emphasizing the value of team production, independent monitors, and intellectual property rights—to a novel corporate transaction structure: the acqui-hire. In an acqui-hire, a publicly owned technology firm wants to add a start-up’s engineers. Instead of simply hiring them, though, it buys the start-up, discards most of its assets, and retains the start-up’s …
Copyright, Consumerism, And The Cloud: Proposing Standards-Essential Technology To Support First Sale In Digital Copyright, Marco Puccia
Copyright, Consumerism, And The Cloud: Proposing Standards-Essential Technology To Support First Sale In Digital Copyright, Marco Puccia
Seattle University Law Review
America’s entertainment industry, and the creative talent that drives it, is a national treasure. Equally valuable, however, is America’s drive and commitment toward technological innovation. These two sectors have been in tension since at least 1908, when the U.S. Supreme Court was asked to determine whether the makers of piano rolls for automatically playing pianos had to pay royalties to the composers. Since that time, the entertainment industry has continued to use copyright law to resist advances in technological innovation that it views as a threat to its existing business models. This Note seeks to provide the necessary context and …
The "Bring Your Own Device" Conundrum For Organizations And Investigators: An Examination Of The Policy And Legal Concerns In Light Of Investigatory Challenges, Carla J. Utter, Alan Rea
The "Bring Your Own Device" Conundrum For Organizations And Investigators: An Examination Of The Policy And Legal Concerns In Light Of Investigatory Challenges, Carla J. Utter, Alan Rea
Journal of Digital Forensics, Security and Law
In recent years, with the expansion of technology and the desire to downsize costs within the corporate culture, the technology trend has steered towards the integration of personally owned mobile devices (i.e. smartphones) within the corporate and enterprise environment. The movement, known as “Bring Your Own Device” (hereinafter referred to as “BYOD”), seeks to minimize or eliminate the need for two separate and distinct mobile devices for one employee. While taken at face value this trend seems favorable, the corporate policy and legal implications of the implementation of BYOD are further complicated by significant investigatory issues that far outweigh the …